Logo

An introduction to Cryptography

Small book cover: An introduction to Cryptography

An introduction to Cryptography
by


Number of pages: 80

Description:
This guide describes how to use PGP (Pretty Good Privacy) to securely manage your organization’s messages and data storage. The book provides an overview of the terminology and concepts you will encounter as you use PGP products. It contains discussions of security, privacy, and the vulnerabilities inherent in any security system, even PGP. This guide is useful to anyone who is interested in knowing the basics of cryptography, and explains the terminology and technology you will encounter as you use PGP products. You will find it useful to read before you begin working with cryptography.

Download or read it online for free here:
Download link
(0.8MB, PDF)

Similar books

Book cover: Practical Cryptography With GoPractical Cryptography With Go
by - Leanpub
This is an introduction to cryptography for programmers; it doesn't aim to teach the theory, but rather to guide you in your attempt to understand how to use cryptography to secure your services. We'll illustrate it using the Go programming language.
(2204 views)
Book cover: Mathematical CryptologyMathematical Cryptology
by - Tampere University of Technology
These notes contain the central mathematical background needed for understanding modern data encryption methods, and introduce applications in cryptography and various protocols. The fledgling quantum cryptography is briefly introduced.
(6881 views)
Book cover: Basic CryptanalysisBasic Cryptanalysis
- United States Department of the Army
Introduction to cryptanalysis, monographic, polygraphic, and polyalphabetic substitution systems, transposition systems, analysis of code systems. Text also contains exhaustive material to aid in the solution of cipher systems.
(8570 views)
Book cover: Visual Cryptography and Its ApplicationsVisual Cryptography and Its Applications
by - BookBoon
Visual cryptography provides a technique by which one secret can be distributed into two or more shares. When the shares are xeroxed onto transparencies and then superimposed, the original secret can be discovered without computer participation.
(4721 views)